• Trump claims offshore wind energy is driving whales loco. Scientists disagree
    www.independent.co.uk
    The Independent's journalism is supported by our readers. When you purchase through links on our site, we may earn commission.NewsScienceTrump claims offshore wind energy is driving whales loco. Scientists disagreePresident Donald Trump has repeatedly attacked wind energy over alleged impacts to whales. But, NOAA says theres no tie between offshore wind and strandingsJulia Mustoin New YorkThursday 27 March 2025 16:56 GMTWhales sing after a good meal: StudySign up for our free Health Check email to receive exclusive analysis on the week in healthGet our free Health Check emailGet our free Health Check emailI would like to be emailed about offers, events and updates from The Independent. Read ourprivacy policyPresident Donald Trump is once again peddling a largely unfounded claim that wind energy is driving whales crazy.You know, in one area, they lost two whales, like, in 20 years washed ashore, he told reporters at the White House on Wednesday, and this year they had 17 wash ashore. So, theres something [that] happened out there, Trump alleged. Theres something driving the whales a little bit loco. Its a claim hes repeated for months. He told the same story about whale strandings in Massachusetts with different numbers in February. The wind mills are driving the whales crazy, obviously, he posited. He said the same thing in January, ahead of his inauguration, and brought the issue up during the last days of his campaign. Then, he discussed similar impacts in New Jersey. Now, theyre coming up every week. Theyre being destroyed because of the sound and the vibration, he alleged. Its so bad.But, scientists at the National Oceanic and Atmospheric Administration say there is no scientific evidence that noise resulting from offshore wind site surveys could potentially cause whale deaths and that there are no known links between large whale deaths and ongoing offshore wind activities.President Donald Trump has repeatedly tied whale strandings to offshore wind development. Scientists say theres no evidence linking the two (Getty Images)Some advocate groups agree with Trumps stance, saying that associations between strandings and wind development should not be ruled out. Experts are still working to understand why strandings which happen around the world, and in remote areas have become more frequent, suggesting that many follow distress calls and that underwater noise pollution can be an issue, as it is for many sea creatures.But not the ones who work for the federal government. While offshore wind surveys conducted before development produce noises that may disturb marine mammals, the sounds are very different from the blasting seismic airguns used in oil and gas surveys, with lower noise and a higher frequency. Any exposure to the sounds would be at significantly lower levels and shorter duration, which is associated with less severe impacts to marine mammals, NOAA said.Even though other scientists do not dismiss effects wind development could have, they stress there has not been a link to strandings around Massachusetts or elsewhere. Massachusetts is a destination for endangered North Atlantic right whales. Scientists say strandings have occurred along the coast event within wind construction and surveys (AFP via Getty Images)Massachusetts charity Whale and Dolphin Conservation spokesperson Caroline Mowdy told the Cape Cod Times that no seismic surveys or wind construction have occurred within the group's 200-mile stranding response area, "yet we are seeing a dramatic increase in large whale strandings."Periodically we read in the news that a whale or some other large animal ends up on the shore, and a lot of times the blame immediately goes to wind turbines. People feel the problem must come from turbine construction noise. Yet when the whales drift ashore, no construction is taking place, James Miller, University of Rhode Island professor of ocean engineering and department chair, said in 2023.The National Marine Fisheries Service said in September that the Vineyard Wind wind farm off the coast of Nantucket is not likely to jeopardize the continued existence of endangered whales, including the North Atlantic right whale. Although, other activity still poses an adverse effect, according to the Boston Herald."My understanding is that whales can be negatively affected (but not killed) by the noise of the pile driving used to install some kinds of wind farm, but operational wind farms have little or no effect," Hal Whitehead, a professor of biology at Dalhousie University, told Phys.org."There is no evidence linking whale deaths to offshore wind farms or 'windmills,'" Lindy Weilgart, an ocean noise expert and policy consultant at the nonprofit OceanCare, told the site. "Europe has way more offshore wind farms and has encountered nothing of the sort."The largest human threats to whales are boat strikes and entanglement in fishing gear. However, man-made climate change is a concern that threatens the gentle giants and their food chain, with warming waters shifting prey distribution and bringing the whales closer to shore. The largest human threats to whales remain boat strikes and entanglement in fishing gear. But, climate change is also an increasing concern (AFP via Getty Images)As someone who studied large whales for my multi-decade career and who also, as a person, just really cares deeply about them the focus for protecting whales really has to be on reducing entanglements and vessel strikes, Jessica Redfern, the associate vice president of ocean conservation science at the New England Aquarium, told Boston.com.We need to minimize the effects of climate change as fast as we can. And offshore wind is one of our tools as long as it is responsibly developed, she said. Join our commenting forumJoin thought-provoking conversations, follow other Independent readers and see their repliesMost PopularPopular videosSponsored Features
    0 Commentaires ·0 Parts ·42 Vue
  • Why You Can (And Should) Opt Out Of TSA Facial Recognition Right Now
    www.huffpost.com
    In a growing number of Transportation Security Administration lines at U.S. airports, you may be asked to look into a camera that takes your photo.But did you even know that you can say no to the face scan? And that you may have good reason to?Since 2020, the face scan is part of TSAs screening program in select airports across America. Through its facial matching technology, TSA claims it can more efficiently and conveniently verify that the person in front of an agent is the person shown on their identification.TSA says this is an optional program for travelers on domestic flights, while some foreign nationals may have to participate to be allowed on international flights.Theoretically, there should be visible signage that notifies travelers they can proceed through airport security without doing the facial scan. In reality, not everyone will see the sign and it might not be in a language that a traveler understands.I am one of the travelers whos been agreeing to get my face scanned in airport security lines for years. But amid alarming reports of travelers experiencing bad treatment from border control officials, Im reconsidering whether I should be submitting a face scan so easily to the U.S. government.Should you, too? I talked with privacy experts about the benefits of opting out of this scan.Why You Should Opt Out Of Face Scans Especially During Trumps Second TermThe benefit to declining is you dont have to submit your picture to the government, for the government to scan it and store it under their rules, said Travis LeBlanc, a lawyer and a former member of the Privacy and Civil Liberties Oversight Board, an independent federal agency.In its 2023 privacy impact assessment about using facial identification, TSA said it only uses the biometric data to perform identity verification at the checkpoint, and to assess critical operational and technological components of this proof of concept.But the potential power of this biometrics technology is vast. In its 2022 roadmap document, TSA outlines a future where the agency expands its biometrics capabilities to validate and verify an identity and vetting status in real-time.In response to HuffPosts questions about the future of real-time biometrics, a TSA spokesperson said in a statement that a real-time picture simply means that an image is taken at the kiosk and that live photograph is matched against the image on the identification credential. The agency said there have been situations where a boarding pass was issued to a person different from the one standing at the checkpoint but did not specify how many imposters its facial recognition technology has caught.Jennifer King, a privacy and data policy fellow at the Stanford University Institute for Human-Centered Artificial Intelligence, said the TSAs public communications are a little vague about what they were doing with the data. That vagueness, along with her skepticism with how the Department of Homeland Security has preserved travelers privacy in the past, is what leads her to decline the face scan every time.Im sure that the dream of enforcement agencies would be to be able to track people in real time based on something like facial recognition, King said.To be clear, TSA explicitly says it is not currently using its biometrics technology for surveillance and that it does not store biographic data for any travelers. Photos are not stored or saved after a positive ID match has been made, except in a limited testing environment for evaluation of the effectiveness of the technology, TSA states.TSA is not the only agency scanning your face at the airport.Customs and Border Protection, which also does facial scans at airport checkpoints, said that if youre a U.S. citizen, CBP will keep your photo for no more than 12 hours after identity verification; if youre not a U.S. citizen, there is no guarantee that CBP will delete your airport security photo quickly.But this kind of facial recognition technology has the potential to one day be used for other purposes beyond identity verification.As LeBlanc noted, TSA is part of the Department of Homeland Security, which is also responsible for immigration enforcement. Theres lots of different uses that you could see for these images.Theres also the concerning reality that the Privacy and Civil Liberties Oversight Board which is supposed serve as a watchdog for travelers civil liberties recently had key members fired by the Trump administration.LeBlanc and the boards two other Democratic members were fired by the Trump administration in January. These firings should give you pause if you care about airport privacy, LeBlanc said. LeBlanc issuing the U.S. government for his reinstatement, saying the termination was illegal.The board is now down to one Republican appointee and cannot take on any new projects without a quorum.The public has lost the watchdog that would be there to promote transparency as well as make recommendations on changes to the system that would better balance privacy and civil liberties, LeBlanc said. He said that the board was preparing a report on TSAs use of facial recognition before the firings.How To Opt Out Of TSA Face Scans At The AirportOpen Image ModalBloomberg via Getty ImagesAbove is TSA's Credential Authentication Technology (CAT-2) identity verification machine in action. Many travelers may not know this but you can exercise the right to opt of this tool's face scan. TSA should not give you a hard time for exercising your right to opt out, but there have been reported instances where people got pushback including a U.S. senator who says he was told that saying no to the face scan would cause a significant delay.Sen. Jeff Merkley (D-Ore.)still declined and faced no apparent delay.Saira Hussain, a senior staff attorney at the Electronic Frontier Foundation, declines the face scan every time she travels. Sometimes when Hussain refuses, she said she gets the response of, We already have your information, so its not like youre giving us anything more. And Im like, OK, well, Im choosing the opt-out option I have.If you, like me, have been obediently agreeing to airport security face scans, its not too late for us to start opting out, either. Every face scan is a unique opportunity to assert your rights, Hussain said.You can simply decline by stating to an agent that you do not want your photo taken and want to opt out of a face scan. From there, a TSA agent should follow standard procedure of looking at your ID and your face to verify your identity. You should not lose your place in line for declining a photo.As TSA itself states on its website, There is no issue and no delay with a traveler exercising their rights to not participate in the automated biometrics matching technology.Beyond asserting your individual privacy rights, saying no could send a larger message on the kind of treatment the public will tolerate at airports.TSAs Credential Authentication Technology units, which run the face scan, are currently used in nearly 84airports nationwideand are expected to be in more than 400 airports over the coming years, TSA states.If more people keep declining face scans, maybe TSA will think twice about whether its actually effective to roll out programs like these, Hussain said.If theres no pushback, then [TSA is] just going to keep instituting more and more invasive techniques, she said.EDITORS NOTE: This story has been updated with comment from TSA.We Don't Work For Billionaires. We Work For You.Big money interests are running the government and influencing the news you read. While other outlets are retreating behind paywalls and bending the knee to political pressure, HuffPost is proud to be unbought and unfiltered. Will you help us keep it that way? You can even access our stories ad-free.Support HuffPostAlready contributed? Log in to hide these messages.
    0 Commentaires ·0 Parts ·42 Vue
  • Amazon shakes up streaming leadership team
    techcrunch.com
    Amazon announced this week that Jennifer Salke is stepping down as the head of Amazon MGM Studios a move that could indicate high-level dissatisfaction with the companys streaming strategy over the past few years.To be clear, Salkes boss Mike Hopkins (the head of Amazon MGM Studios and Prime Video) praised her work in an email to employees and described her departure as one that allows the company to flatten our leadership structure a bit a recurring theme in recent tech company layoffs.In other words, Amazon does not intend to fill Salkes role. Instead, the heads of its film and TV studios report directly to Hopkins.But the reporting around Salkes departure highlights Amazons streaming disappointments and challenges under her leadership. Previously an exec at NBC, Salke joined Amazon Studios in 2018, as the company was looking to expand beyond critically praised movies and shows into more mainstream hits.The streamer has had its share of successes since then, including Reacher, Jack Ryan, Fallout, and The Boys. It also made a big bet on The Lord of the Rings: The Rings of Power, a show whose premiere drew a record audience for Amazon, but which has not proven to be the world-conquering phenomenon that youd hope for with a reported budget of more than $1 billion.And then theres Citadel, an espionage show designed as the epicenter of a fictional universe of global spinoffs like Citadel: Diana and Citadel: Honey Bunny. Extensive reshoots reportedly turned Citadel into the second most expensive show ever made (behind only The Rings of Power), but its reception has been even more underwhelming. The Hollywood Reporter says the second season has been delayed from fall 2025 to spring 2026, with further spinoffs put on hold.Amazon has also struggled to get another James Bond film into production, following its acquisition of MGM in 2022. Producers Michael Wilson and Barbara Broccoli (the offspring of longtime Bond producer Albert Cubby Broccoli) maintained creative control of the franchise, and a Wall Street Journal report in December suggested that Barbara Broccoli was particularly unhappy with Amazon she was apparently annoyed in an early meeting when Salke referred to Bond as content, and she was even reported to describe the tech giants team as idiots.Another source said that Amazon founder Jeff Bezos was, in turn, so angered by the WSJ story about Broccoli that he declared, I dont care what it takes, get rid of her, with the company subsequently paying the Wilson and Broccoli to give up control.Salkes name was noticeably missing from Amazons announcement of the Bond deal. She will, however, be starting a new film and TV production company with a first-look deal at Amazon.
    0 Commentaires ·0 Parts ·43 Vue
  • Elon Musks xAI buys X
    techcrunch.com
    Welcome back to Week in Review! Elon Musk says that xAI bought X in an all-stock deal; a16z-backed 11x faked some customers; the Lumon Terminal Pro pops up on Apples website; and much more. Lets dig in!xAI buys X: X owner Elon Musk announced on X on Friday that xAI acquired X in an all-stock transaction. This combination values xAI at $80 billion and X at $33 billion. Today, we officially take the step to combine the data, models, compute, distribution and talent, Musk said.Fudging the numbers: More than 20 sources including investors and current and former employees told TechCrunch that a16z- and Benchmark-backed 11x has experienced financial struggles, largely of its own making. They absolutely massaged the numbers internally when it came to growth and churn, a former employee said.Block layoffs: A leaked message by Block CEO Jack Dorsey reviewed by TechCrunch revealed that the company which owns Cash App and Square was laying off 931 people, or 8% of the company, as part of an org restructuring. Dorseys email denies that the layoffs are for financial reasons or to replace workers with AI.This is TechCrunchs Week in Review, where we recap the weeks biggest news. Want this delivered as a newsletter to your inbox every Saturday? Sign up here.NewsImage Credits:Victor J. Blue/Bloomberg / Getty ImagesWhat, me do fraud? The White House confirmed to TechCrunch on Friday that President Trump pardoned Trevor Milton, the founder of bankrupt hydrogen trucking startup Nikola who was convicted of fraud. The pardon comes just a few weeks after Nikola filed for Chapter 11 bankruptcy.Speaking of leaks: A leaked database seen by TechCrunch shows that China has developed an AI system that supercharges its already formidable censorship machine, extending far beyond traditional taboos like the Tiananmen Square massacre.Skunkworks spins out: Rivians skunkworks project was spun out of the company with a new name and $105 million in funding from Eclipse Ventures. The startup, called Also, will exist as a stand-alone company from Rivian.Get your computers ready: Apple announced that Worldwide Developers Conference 2025 will begin June 9. Reports have indicated that Apple has prepared dramatic software overhauls for the iPhone, iPad, and Mac. We also expect iOS 19, which, according to Bloomberg, will be the biggest revamp since iOS 7.DNA debacle: DNA testing company 23andMe filed for bankruptcy this week. The companys co-founder and CEO, Anne Wojcicki, separately said she is leaving to become an independent bidder for the company. Your data might not be safe, so here are some ways to delete it.An act of Congress: Kat Abughazaleh, the 26-year-old who was among the people laid off from Media Matters after Elon Musk sued the company, announced this week that shes running for Congress. Im trying to be really transparent about how to run for office, because I feel like its kind of this black hole that seems a lot more difficult than it should be, she told TechCrunch.A slice of Severance: I havent watched any seasons of Severance, and based on seemingly everyone in the world, Im absolutely missing out. My colleague Sarah is among those people, and she spotted a Lumon Terminal Pro (the machine they use in the show) on Apples website.Backdoor to China: SpaceX, a defense contractor for the Pentagon, reportedly allowed Chinese investors to buy shares, as long as the funds are routed through the Cayman Islands or other offshore hubs.The Switch 2 is coming! And at Nintendo Direct, the company announced that its working on Virtual Game Cards that allow players to take their downloaded games with them to use on other devices.AnalysisImage Credits:Eugene Gologursky/The New York Times / Getty ImagesChatGPTs new image generator launched this week, and with it came a flood of images based on art by Studio Ghibli being posted online. While the debate over whether this is horrifying (Studio Ghibli co-founder Hayao Miyazaki once said that AI is an insult to life itself) or cool, it does highlight one thing: Copyrights are still a concern when it comes to AI-generated anything. Although copying the art style isnt necessarily unlawful, OpenAI training its models on Studio Ghiblis art operates in a legal gray area.I think this raises the same question that weve been asking ourselves for a couple years now, Evan Brown, an intellectual property lawyer, told TechCrunch. What are the copyright infringement implications of going out, crawling the web, and copying into these databases?
    0 Commentaires ·0 Parts ·41 Vue
  • The M4 Mac Mini has dropped to a new low price at Amazon - get it while the deal lasts
    www.zdnet.com
    Amazon lowered the price on most M4 Mac Mini desktops. You can purchase the base model for as low as $529.
    0 Commentaires ·0 Parts ·38 Vue
  • This $80 off iPad deal is a steal - and it's the model I recommend to most people
    www.zdnet.com
    The iPad 10th Gen is an excellent device for streaming your favorite content, reading, video calls and surfing the web. It's currently on sale for only $269 ahead of Amazon's upcoming Spring Sale.
    0 Commentaires ·0 Parts ·38 Vue
  • 3 Nightmarish Facts About The Black Mamba Blistering Agility, Fast-Acting Venom And Relentless Strikes
    www.forbes.com
    A bite from a black mamba in the wilds of Africa is almost always a death sentence without swift ... More medical intervention. Here are three reasons why.gettyMost people know that the black mamba (Dendroaspis polylepis) is an African species of elapid snake, notorious for its extraordinary length and incredibly potent venom. Some may even have heard of its ability to lunge forward with explosive speed, making it appear as if it is leaping through the air. Fewer, however, understand that its name comes from the inky black interior of its mouth, a chilling warning that says Im threatened before it strikes.But what fascinates evolutionary scientists is how every one of its traits is perfectly honed for predation. Each characteristic is terrifying on its own, but together, they create one of the most efficient, nightmarish predators in the natural world. When these key factors align, the black mamba isnt just deadly its a perfect storm of serpentine terror.1. Black Mambas Are Estimated To Move Nearly As Fast As You Can SprintThe black mamba is renowned for its exceptional speed, making it one of the fastest land snakes globally. In fact, National Geographic estimates that the snake can reach speeds of up to 12.5 mph over short distances. This agility allows the black mamba sometimes stretching up to 14 feet to effectively escape threats and swiftly pursue prey.In comparison, the average human sprinting speed varies based on fitness and training levels. For instance, average male sprinters can reach speeds of approximately 19.52 mph, while female sprinters average around 17.12 mph.This suggests that, on a smooth, controlled track designed for human sprinting, a trained athlete would outpace a black mamba. However, in a real-world encounter out in the savannas, rocky hills, and open woodlands of sub-Saharan Africa the black mambas explosive acceleration, agility, and unpredictable movements would make it a formidable presence. Its a powerful reminder of why its best to admire such animals from a safe distance in their natural habitat.The snakes primary mode of movement, lateral undulation, allows it to carve an S-shaped path through its terrain, using its muscular coils like a spring-loaded machine. Specialized scales act like tiny hooks, helping it grip and push off against the ground. Unlike clumsier species that struggle with obstacles, the black mamba leverages every surface with surgical precision, effectively turning the landscape into a series of launchpads.2. Without The Right Antivenom, A Black Mamba Bite Could Kill You In About 30 MinutesThe black mamba is notorious for its highly potent neurotoxic venom, which can lead to fatality in about 30 minutes if a severe bite goes untreated. The World Health Organization classifies it as one of the snakes of highest medical importance in sub-Saharan Africa due to the potency of its venom and the rapid onset and severity of clinical manifestations.The black mambas highly potent venom acts swiftly, shutting down nerve function and leading to progressive paralysis, respiratory failure and, ultimately, death if left untreated.A documented case in Switzerland, where a snake breeder was bitten by a black mamba, is a study in how to treat a victim. Despite being far from the snakes native range, rapid administration of antivenom was lifesaving. The case reinforces a crucial medical principle: the sooner antivenom is administered, the higher the chance of survival.Without antivenom, a black mamba envenomation carries a near 100% mortality rate. This is especially concerning because, throughout much of the species native range in sub-Saharan Africa, access to life-saving antivenom can be limited or unavailable.3. Black Mambas Can Be Frighteningly Locked In When ThreatenedDespite its fearsome reputation, the black mamba is naturally shy and avoids human encounters whenever possible. It would much rather flee than fight, using its incredible speed to escape danger. However, when cornered, provoked, or perceiving no way out, it transforms into an absolute killer.Once triggered, the black mamba unloads a relentless flurry of high-speed bites. Unlike snakes that rely on camouflage and venom yield to incapacitate prey, the black mambas strategy is shock-and-awe defense. It strikes in rapid succession, injecting large amounts of its potent neurotoxic venom with each bite.What makes this so terrifying is the speed and precision of its attack. In a fraction of a second, the snake can lash out multiple times, targeting the face, limbs, or any exposed area of its attacker. This blitzkrieg-style defense is often enough to scare off even large predators, as a single envenomation can incapacitate within minutes.Weve uncovered the traits of the black mamba that make it legendary now, what about the animal in your home? Take the Pet Personality Test to better understand your furry (or scaly) companion.
    0 Commentaires ·0 Parts ·41 Vue
  • Top 14 Social Engineering Attack Types And Their Subcategories
    www.forbes.com
    Text sign showing Social Engineering. Conceptual photo Psychological Manipulation Gain Access thru ... More Fraud.gettyHackers are not always technical wizardsoften, they exploit human nature. Social engineering attacks rely on psychological manipulation to trick people into revealing sensitive info or taking harmful actions. These scams often create a false sense of urgency or trust, bypassing even the strongest digital defenses.From phishing emails to deepfakes, tactics are evolving fastmaking it easier than ever for attackers to fool both individuals and businesses. What makes these threats especially dangerous is that they target the weakest link in your cybersecurity posture: human error.14 Social Engineering Attack Types Explained1) PhishingPhishing is one of the most common types of social engineering attacks. There are many variations of phishing attacks. Some of the most widespread ones include:Mass PhishingAttackers impersonate trusted sources to steal data. They send mass emails containing fake links or attachments, using fear or urgency to trick victims into revealing personal information.Spear PhishingSpear phishing takes a more focused approach. Attackers start by researching their targetgathering specific details such as the persons name, role, and other personal information. With this intel, they create tailored messages designed to appear familiar or trustworthy, increasing the chances that the victim will fall for the trap.CEO Fraud\BECThis attack involves a cybercriminal posing as a top executiveoften the CEOto deceive an employee, usually in finance or HR, into sending money or sharing sensitive data. It typically relies on urgent, convincing messages as part of a business email compromise scam.WhalingIn whaling attacks, the targets are high-level executivesoften referred to as whales. This form of phishing is explicitly aimed at influential figures like CEOs or politicians, with the goal of stealing sensitive information or getting them to approve large financial transactions.PharmingPharming is a more advanced type of phishing that silently redirects users to a fake website to steal their personal information. This is done by tampering with the victims computer settings or exploiting flaws in DNS servers. Unlike typical phishing, users do not need to click a linkthey are taken to the fake site automatically, where attackers can capture sensitive data like passwords or credit card numbers.SmishingSmishing is a type of phishing that uses text messages to deceive victims into giving up personal information. These texts often appear to come from trusted sources, like banks or well-known companies and may include links or urgent requeststaking advantage of the recipients trust to carry out fraud.VishingVishingshort for voice phishingis a scam where attackers use phone calls to manipulate people into sharing private or financial details. Posing as legitimate entities, like banks or government agencies, they rely on sounding convincing to earn the victims trust and extract sensitive information.2) PretextingPretexting is when an attacker makes up a fake story or situation to trick someone into giving away sensitive information or doing something that puts their security at risk. They usually pretend to be someone trustworthylike a bank representative or a company employeeto gain the victims confidence. The fake scenario is often designed to tap into the victims instinct to be helpful or follow authority. To make the lie more believable, the attacker frequently does some homework on the victim beforehand and uses persuasive, well-crafted tactics to manipulate them.3) BaitingBaiting plays on basic human impulsescuriosity, temptation, and the lure of getting something for nothing. Think of it as a trap disguised as a gift. An attacker might drop a mysterious USB drive in a parking lot with a label like Company Layoffs 2025 or post an irresistible download link offering a blockbuster movie for free. Whether it is a physical item or a digital file, the goal is the same: spark enough interest for someone to take the bait. The moment that curiosity wins and the bait is opened, hidden malware springs into actioninfecting the device, stealing information, or opening the door for deeper attacks.4) Tailgating \ PiggybackingTailgating, or piggybacking, is a social engineering trick where someone sneaks into a secured arealike an apartment building or gated communityby closely following a resident. They exploit everyday politeness, such as holding the door open for a delivery person or someone who says they forgot their key. By appearing harmless and blending in, these individuals bypass security and gain access to private spaces, putting residents and personal property at risk.5) Diversion TheftDiversion theft happens both online and offline, targeting deliveries. Online, attackers trick customers into changing shipping addresses or hijack accounts to reroute packages. They may intercept tracking updates to redirect goods before delivery. Offline, thieves pose as couriers, using fake uniforms or IDs to grab packages mid-route or steal them from doorsteps. In both cases, the goal is the same: deceive, divert, and steal goods during the delivery process for personal gain.6) Romance Scams \ Honey TrapsA romance scam or honey trap attack uses emotional or romantic manipulation to deceive victims. The attacker pretends to be romantically interested, often using fake profiles and flattery to build trust. Over time, they aim to extract money, personal details, or access to sensitive data. These scams often involve seductive messages, convincing backstories, and prolonged online communication designed to emotionally hook the target before exploiting them.7) ExtortionCriminals use fake extortion schemes to scare victims into paying. These scams rely on fear and threats, often convincing targets to act quickly. Many fall for them, fearing imagined consequences. Below are typical examples:ScarewareScareware is fake security software that tricks users into thinking their device is infected. Alarming pop-ups or fake scans create panic, urging victims to buy bogus antivirus tools or share personal info. It exploits fear and limited tech awareness.SextortionSextortion is blackmail using threats to expose sexual content. Attackers demand more explicit material or money, exploiting fear and shame. Victims are manipulated psychologically, with threats to share compromising content unless demands are met.DoxingDoxing is the act of publicly exposing someones personal detailslike home address, phone, email, or workplacewithout consent, often as a threat.DDoS ThreatsCybercriminals threaten Distributed Denial of Service attacks to disrupt personal websites unless payment is made.Reputation Damage ThreatsExtortionists threaten to ruin reputations with false or damaging info unless demands, like payment, are met.Extortion With Threat To KillExtortion scams involving death threats prey on deep fears. Scammers demand money, claiming theyll harm the victim or their family if payment isnt made. These threats are meant to pressure and terrify victims into compliance.8) Watering HoleA watering hole attack is a social engineering method where hackers compromise websites their targets frequently visit. By injecting malicious code into these trusted platformslike industry news sites or forumsthey infect users devices without direct interaction. This tactic exploits user trust in familiar sites, allowing attackers to silently breach systems of specific individuals or organizations.9) Quid Pro QuoQuid pro quo is a social engineering tactic where cybercriminals offer a benefit or favor in exchange for sensitive information or access. They may pose as IT technicians or service providers, offering help, quick fixes, discounts, or exclusive services. The attacker exploits the victims trust and willingness to reciprocate, using the offer to gain confidential data.10) TyposquattingTyposquatting, or URL hijacking, is a cybercrime tactic that exploits typing mistakes in website addresses. Attackers register domains nearly identical to popular sites, relying on users to mistype URLs. These fake sites often mimic the look and feel of the real ones, tricking users into entering login credentials or downloading malware.11) Social Media MentionsAttackers exploit the @username feature on social media to appear credible. By tagging real users or organizations, they make their posts seem trustworthy, tricking others into engaging with deceptive content or falling for scams disguised as legitimate interactions.12) HoaxesA hoax spreads false information to mislead targets, often using alarming messages to create fear or warn about fake threats, manipulating victims into unnecessary actions or panic.Tech Support ScamA well-known hoax is the tech support scam, in which fraudsters falsely claim the victims computer has a problem. They impersonate support staff from trusted companies to gain remote access or pressure the user into paying for bogus services they do not actually need.Charity ScamCharity scams often appear after disasters, pandemics, or during holidays, asking for donations to fake causes. Exploiting empathy, scammers trick people into acting emotionally, leading to unsafe actions and potential security risks.Lottery ScamScammers claim you have won money, then demand personal info or a fee to claim the fake prize.13) Dumpster DivingDumpster diving is a low-tech tactic where scammers rummage through household trash to find discarded documents containing sensitive information. Items like bank statements, medical bills, or personal letters can reveal names, account numbers, or login details. With this data, attackers can steal identities, access accounts, or commit fraud. Some home users unknowingly make themselves targets by tossing out unshredded papers, making proper disposal of personal information essential for protecting privacy and security.14) Shoulder SurfingShoulder surfing is a tactic where someone watches another person type or view sensitive information, like passwords, PINs, or credit card numbers. It does not always require close proximityattackers can use cameras, binoculars or even spy during video calls. This simple but effective method allows cybercriminals to gather valuable personal data without hacking.How Home Users Can Fight Back Against Social Engineering: 11 TipsHere is how home users can safeguard themselves from social engineering attacks:Shrink your digital footprint. Be thoughtful about what you post onlineespecially on social mediato make it harder for cybercriminals to gather personal details about you.Protect your devices with trusted antivirus tools. A strong antivirus program is your first line of defense against malware and other cyber threats.Stay calm and collected when online. Do not rushwhether you are clicking links, filling out forms, or responding to messages. A level-headed approach can prevent costly mistakes.Handle unexpected emails and links with care. Avoid opening attachments or clicking on links from unknown senders. Always double-check URLs and email addresses to spot fakes.Monitor your bank accounts and credit reports regularly. Fraudsters often go after your financescatching suspicious activity early can make all the difference.Avoid plugging in unfamiliar USB drives or gadgets. External devices can carry hidden malware. If you do not know where it came from, do not connect it.Keep your devices and accounts private. Never let anyone else log into your phone, computer, or online accounts.Use a VPN when browsing or shopping online. A Virtual Private Network adds a layer of encryption that helps shield your activity from prying eyes.Turn on Multi-Factor Authentication. Adding an extra step to your logins greatly improves your security.Watch for leaked personal data on the dark web. If your info ends up there, you will want to knowand actfast.Consider signing up for identity theft protection. These services can help detect suspicious activity and guide you through recovery if needed.
    0 Commentaires ·0 Parts ·43 Vue
  • Microsoft Office apps will soon preload on Windows boot for faster launch
    www.techspot.com
    WTF?! Microsoft is rolling out a clever tweak to help Office apps launch faster on Windows. Dubbed "Startup Boost," this new feature quietly runs in the background as soon as you log in the operating system, preloading "performance enhancements" so apps like Word, Excel, and PowerPoint open more quickly when you need them. The announcement comes from the Microsoft 365 Message Center. The feature works by preloading parts of Office apps into memory after Windows startup and keeping them in a paused state until you actually launch them. If the system needs those resources back, it will automatically clear them. The goal is to shave off a few seconds of waiting when you open an Office app.However, there are a few caveats. Startup Boost won't run on every PC it requires at least 8GB of RAM and 5GB of free disk space to avoid slowing down your system. It also turns itself off when Energy Saver mode is enabled, so battery life won't take a hit.If you're not a fan of background processes, Microsoft allows users to disable the feature under Options > General in Office settings.Here's the catch, though: even if you turn it off, the next Office update will turn it back on. Microsoft confirmed that the installer will recreate the scheduled task each time it applies an update, meaning you'll have to disable it manually again if you prefer to keep it off.Here's the catch, though: even if you turn it off, the next Office update will turn it back on. // Related StoriesIf the feature sounds familiar, that's because Microsoft pulled a similar move with its Edge browser back in 2021. Edge's Startup Boost keeps background processes running at login to reduce launch times a trick that apparently worked well enough to justify bringing it to Office."Please note that Office Installer will automatically recreate all scheduled tasks when it applies an update, so users who disable this task will need to disable it again after an Office update," the company notes.The rollout begins in mid-May, with global availability expected by the end of the month. The feature will launch with Word first, with other Office apps to follow.All in all, if you spend a lot of time in Office, you might notice things feeling a bit snappier assuming your PC meets the requirements. And if not, at least Microsoft is giving you the option to opt out (even if you'll have to keep doing it after updates).
    0 Commentaires ·0 Parts ·46 Vue
  • Dolbys future uncertain as free options grow
    www.digitaltrends.com
    Table of ContentsTable of ContentsRoyalties must be paidThe video format death matchAtmos under attackA free future?For decades, Dolby Labs has been the undisputed leader in audio and video formats. Even when people cant necessarily describe why a movie sounds better in Dolby Atmos or looks better on their TV when its presented in Dolby Vision, they know that these are the labels to look for when buying a new TV or soundbar, or when signing up for a streaming service like Netflix. Dolbys near ubiquity is a testament to its technological innovation and masterful marketing. Its hard to find another example of a company that makes no physical products, yet commands such instant brand recognition.But Dolbys days as the audio/video format king look increasingly numbered as companies ramp up their adoption of free alternatives.Recommended VideosThe lions share of Dolby Labs profits comes from licensing its technologies to manufacturers and service providers. The sale of every TV, streaming device, or soundbar compatible with content created using a Dolby format results in a small payment to the company. The exact amount per unit is known only to Dolby and its licensees, but cumulatively its worth hundreds of millions.Please enable Javascript to view this contentSince the majority of the consumer electronics industry is built on razor-thin margins, every penny counts. This has created incentives for players to band together to develop royalty-free alternatives to Dolbys formats.Dolby LabsIn the world of video, Dolby Vision is the most popular flavor of dynamic HDR a version of high dynamic rangetechnology that allows for more brightness than standard HDR, in addition to scene-by-scene grading of color and contrast.Its widely used on 4K UltraHD Blu-ray discs, and virtually every HDR-compatible streaming service includes titles presented in Dolby Vision.However, not long after Dolby Vision debuted, a consortium led by Samsung developed HDR10+, an open-source and royalty-free alternative. Adoption of HDR10+ was slow at first, but with Netflixs recent announcement that it intends to offer HDR10+ for all HDR titles by the end of 2025, Dolby Visions dominance is coming to an end.Its an especially important victory for Samsung. Not only did the Korean juggernaut spearhead the creation of HDR10+, it also steadfastly refused to license Dolby Vision for any of its TVs.Digital TrendsDolby Atmos is Dolbys other key content technology. Atmos is a spatial audio format that enjoys massive adoption across movies, TV shows, and most recently, music recordings under the Dolby Atmos Musicbrand.Since audio content, devices, and services far outnumber their video counterparts, and since Atmos has thoroughly beaten its main rivals (DTS:X and Sony 360 Reality Audio) in the adoption race, Dolby Atmos has become synonymous with spatial audio.A few years ago, Samsung decided to take aim at Dolby Atmos, hoping to repeat its HDR10+ success.This time, Samsung enlisted the support of Google and the Alliance for Open Media, whose members include tech heavyweights like Apple, Amazon, Microsoft, THX, and Nvidia. The result is a new open-source spatial audio format known formally as IAMF. But since thats a terrible label, IAMF was given a catchy new brand name at CES 2025. Going forward, it will be known as Eclipsa Audio.Open Media AudioEclipsa Audio, according to Samsung and Google, lets anyone create spatial audio for free. If youre a professional who uses industry-standard software like AVID Pro Tools DAW, there will soon be free Eclipsa plugins. But perhaps more importantly, any manufacturer can support Eclipsa royalty-free on their audio products.As with HDR10+, you can expect Eclipsa adoption to be slow at first. And, once again, Samsung is leading the charge on the hardware front. Its latest flagship soundbar, the HW-Q990F, is the first with Eclipsa compatibility.Despite these threats to Dolbys dominance, dont expect to see Dolby Vision or Dolby Atmos disappear anytime soon. These formats have a big head start, and as I indicated earlier, public awareness of Dolbys brands cant be underestimated. The presence of those brands on a products box (or the product itself) is now seen as a promise of audio or video quality, even when buyers dont have access to the content needed to experience the benefits those technologies offer. Thats a big reason for companies to continue licensing Dolbys tech.It will be years before folks associate that same level of quality with HRD10+ and Eclipsa, if in fact they ever do. And for that to happen, some serious marketing firepower will need to be employed. If Apple, for instance, were to back these technologies the way it has done so far with Dolby Vision and Dolby Atmos, it could be a game changer.Dolby is also a savvy player. Even as free alternatives threaten to erode its market share, its continuing to innovate. One of those innovations is Dolby Atmos Flex Connect, a new way for TV manufacturers to provide wireless speakers that can be placed anywhere in a room without the need for a connected soundbar and still provide an immersive experience.The good news is that competition appears to be doing what its supposed to do: increase choice for buyers while acting as both a carrot and a stick to drive the next set of technical achievements even if you may have to learn a few new tech terms before you buy your next TV.Editors Recommendations
    0 Commentaires ·0 Parts ·47 Vue